Assessment of Security Trepidation in Cloud Applications with Enhanced Encryption Algorithms

Main Article Content

Thotakuri Srilekha
Vijay Bhanu S
Niranjan P

Abstract

To alleviate crank in routine process in IT related work environment we are maintaining information’s in cloud storage even though we affected by pandemic and other natural disaster still can able to access data by avoiding degrade in target process. Members who posses account in cloud no need to have separate high end configuration devices because even less configured devices could connect to cloud and make use of all services using virtual machine. Applications belong to cloud storage intimidated in the aspect of safety. This paper reviews the various security related issues and its causes along with latest cloud security attacks. We discussed about different technology to protect information resides in cloud and analyzed different enhanced algorithm for encryption for securing the data in cloud due to surge use of devices interacting cloud services.

Article Details

How to Cite
Srilekha, T. ., S, V. B. ., & P, N. . (2023). Assessment of Security Trepidation in Cloud Applications with Enhanced Encryption Algorithms. International Journal on Recent and Innovation Trends in Computing and Communication, 11(9s), 492–497. https://doi.org/10.17762/ijritcc.v11i9s.7460
Section
Articles

References

Suthir S and Janakiraman S, “SNT Algorithm and DCS Protocols coalesced a Contemporary Hasty File Sharing with Network Coding Influence”, Journal of Engineering Research, Vol. 6, Issue 3, pp.54-69, 2018.

Prabhu et.al., “Privacy preserving steganography based biometric authentication system for cloud computing environment”, Measurement: Sensors Journal, Vol 24, Dec 2022, https://doi.org/10.1016/j.measen.2022.100511

Thyagarajan C, et.al., “A Typical Analysis and Survey on Healthcare Cyber Security” in Int. Journal of Scientific and Technology Research, Vol.9, Issue.3, pp.3267-3270, 2020, ISSN: 2277-8616

Saurabh Singh, Young-Sik Jeong, Jong Hyuk Park, A survey on cloud computing security: Issues, threats, and solutions, Journal of Network and Computer Applications, Volume 75,2016,Pages 200-222,ISSN 1084-8045,https://doi.org/10.1016/j.jnca.2016.09.002.

Subashini, and Veeraruna Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of network and computer applications, Vol. 34, Issue 1, pp. 1-11, 2011.

Ashish Singh, Kakali Chatterjee, Cloud security issues and challenges: A survey, Journal of Network and Computer Applications,Volume 79,2017,Pages 88-115,ISSN 1084-8045.

Krishnamurthy A, Kumar B,” The Repaschine: A Robot to Analyze and Repair Roads Using Cutting-Edge Technologies, EAI/Springer Innovations in Communication and Computing, pp. 249–254, 2021, https://doi.org/10.1007/978-3-030-49795-8_24

P. Li and X. Yang, "On Dynamic Recovery of Cloud Storage System Under Advanced Persistent Threats," in IEEE Access, vol. 7, pp. 103556-103569, 2019, doi: 10.1109/ACCESS.2019.2932020.

Vijayaraj, N., Arunagiri, S. Demultiplexer design using photonic crystal ring resonator with high quality factor and less footprint for DWDM application. Opt Quant Electron 54, 465 (2022). https://doi.org/10.1007/s11082-022-03817-2

Nivethitha, et.al., “Conceptual approach on smart car parking system for industry 4.0 internet of things assisted networks”, in Measurement: Sensors, Volume 24, December 2022, https://doi.org/10.1016/j.measen.2022.100474

Prabhu D, et.al., “Design of Multiple Share Creation with Optimal Signcryption based Secure Biometric Authentication System for Cloud Environment”,International Journal of Computers and Applns., 2022, 44(11), pp. 1047–1055, https://doi.org/10.1080/1206212X.2022.2103890

Y. Liu, Y. Zhang, J. Ling, and Z. Liu, ‘‘Secure and ?ne-grained access control one-health care records in mobile cloud computing, ’’FutureGener. Comput. Syst., vol. 78, pp. 1020–1026, Jan. 2018.

Vijayalakshmi C, et.al., "A survey on solving dilemmas of adapting blockchain in different applications" 1st International Conference on Recent Advances in Manufacturing Engineering Research, ICRAMER 2021, AIP Conference Proceedings, 2460, 070011 (2022); https://doi.org/10.1063/5.0095701

Nivethitha.V, M.Bhavithra – “Real Time Sectionalization of Enhanced Sharpness Video using FPGA” in Elysium Journal of Engineering Research and Management, Volume 3, Issue 4, Page No. 23 - 26, August-2016. ISSN: 2347-4408.

Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T., 2012. Cross-vm side channels and their use to extract private keys. In: Proceedings of the ACM conference on Computer and communications security. ACM, pp. 305–316.

Sangeetha SKB, Vanithadevi V, Rathika SKB (2018) Enhancing cloud security through efficient fragment-based encryption. Int J Pure Appl Math 118(18):2425–2436

Dr. Ramalingam Sugumar and K. Arul Marie Joycee, “FEDSACE: a framework for enhanced user data security algorithms in cloud computing environment,” International Journal on Future Revolution in Computer Science & Communication Engineering, vol. 4, no. 3, 2018.

Li Wei, Machine Learning in Fraudulent E-commerce Review Detection , Machine Learning Applications Conference Proceedings, Vol 2 2022.

Nivethitha V, Sivasubramanian A "Intensification and Interpretation of Performance in 5G adopting Millimeter Wave: A Survey & Future Research Direction", International Arab Journal of Information Technology, Volume 20, Issue Number 4, July 2023.

D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman, and D. Woods, ‘‘Cloud-trust—A security assessment model for infrastructure as a service cloud,’’ IEEE Trans. Cloud Comput., vol. 5, no. 3, pp. 523–536, Jul./Sep. 2017.

H. A. Al Essa and A. S. Ashoor, “Enhancing performance of AES algorithm using concurrency and multithreading,” ARPN Journal of Engineering and Applied Sciences, vol. 14, no. 11, 2019.

Suthir S, Janakiraman S, Srividya M and Anusha N, “A contemporary network security technique using smokescreen SSL in huddle network server”, 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), 2016, pp 673-676. https://doi.org/10.1109/AEEICB.2016.7538376

Suthir S and Janakiraman S, “A Contemporary hasty file sharing system in network”, 2018, http://hdl.handle.net/10603/231589

C Jayashri, et.al. July-2017. “Big Data Transfers through Dynamic and Load Balanced Flow on Cloud Networks”, in IEEE Xplore, ISBN: 978-1-5090-5434-3. DOI: 10.1109/AEEICB.2016.7538376

Suthir S & Dr.S.Janakiraman, 2013. “Contemporary and efficient shared area network in Peer-to-Peer Communication”, in IEEE Xplore, ISBN: 978--14673-2758-9. DOI: 10.1109/ICRCC.2012.6450544

B. Allen, J. Bresnahan, L. Childers, I. Foster, G. Kandaswamy, R. Kettimuthu, J.Kordas, M. Link, S. Martin, K. Pickett, and S. Tuecke, “Software as a service for data scientists,” Commun. ACM, vol. 55, no. 2, pp. 81–88, 2012.

Suthir S & Dr.S.Janakiraman, May-2017. “A Survey of Fast File Sharing System in Network” in International Journal of Engineering Development and Research, Vol. 5, Issue: 2, May 2017, pp. 1298-1304, ISSN: 2321-9939, https://zenodo.org/record/583721

Ijaz Ahmad Awan, Muhammad Shiraz, Muhammad Usman Hashmi, Qaisar Shaheen, Rizwan Akhtar, Allah Ditta, "Secure Framework Enhancing AES Algorithm in Cloud Computing", Security and Communication Networks, vol. 2020, Article ID 8863345, 16 pages, 2020. https://doi.org/10.1155/2020/8863345

G.S. Mahmood, J. H. Dong, and B. A. rahman Jaleel, “Achieving an e?ective, con?dentiality and integrity of data in cloud computing,” International Journal of Network Security, vol. 21, no. 2, pp. 326–332, 2019.

Li Wei, Machine Learning in Fraudulent E-commerce Review Detection , Machine Learning Applications Conference Proceedings, Vol 2 2022.

A. Firman, A. N. Hidayanto, and P. Harjanto, “Critical components of security framework for cloud computing community: a systematic literature review,” International Journal of Pure and Applied Mathematics, vol. 118, no. 18, pp. 3345–3358, 2018.

Fursan Thabit, Associted Prof. Sharaf Alhomdy, Abdulrazzaq H.A. Al-Ahdal, Prof. Jagtap, A New Lightweight Cryptographic Algorithm for Enhancing Data Security In Cloud Computing,Global Transitions Proceedings,2021,ISSN 2666-285X, https://doi.org/10.1016/j.gltp.2021.01.013.

Prof. Virendra Umale. (2020). Design and Analysis of Low Power Dual Edge Triggered Mechanism Flip-Flop Employing Power Gating Methodology. International Journal of New Practices in Management and Engineering, 6(01), 26 - 31. https://doi.org/10.17762/ijnpme.v6i01.53

A. H. A. Al-ahdal, NLBSIT?: "A New Lightweight Block Cipher Design for Securing Data in IoT" International Journal of Computer Sciences and Engineering Open Access NLBSIT?: A New Lightweight Block Cipher Design for Securing Data in IoT Devices, November, 2020.

A. Arab, M. J. Rostami, and B. Ghavami, “An image encryption method based on chaos system and AES algorithm,” The Journal of Supercomputing, vol.75, no.10, pp.6663–6682, 2019.

Sajay, K.R., Babu, S.S. & Vijayalakshmi, Y. Enhancing the security of cloud data using hybrid encryption algorithm. J Ambient Intell Human Comput (2019). https://doi.org/10.1007/s12652-019-01403-1

Z.Z.Cao et.al Joint Static and Dynamic Traffic Scheduling in Data Center Networks. in Proceedings of IEEE INFOCOM 2014, pp.2445-2553.

Xinyi Huang, Shaohua Tang, Jin Li, Xiaofeng Chen, Yang Xiang, Senior Member, IEEE, Mohammad Mehedi Hassan, Member, IEEE, and Abdulhameed Alelaiwi, Member, IEEE “Secure Distributed De Duplication Systems with Improved Reliability” IEEE Transac. on computers, vol. 64, no. 12, December 2015.

Lin Xiang, Xiaohu Ge, Senior Member, IEEE, Cheng-Xiang Wang, Senior Member, IEEE, Frank Y. Li, Senior Member, IEEE, and Frank Reichert, “Energy Efficiency of Cellular Networks Oriented on Spatial Distributions of Traffic Load and Power Consumption” IEEE Trans. wireless communications, vol. 12, no. 3, March 2013.

Utkarsh Gupta1 and Mrs. Shivani Saluja and Mrs. Twinkle Tiwari, Enhancement of Cloud Security and removal of anti-patterns using multilevel encryption algorithms, International Journal of Recent Research Aspects ISSN: 2349-7688, Vol. 5, Issue 1, March 2018, pp. 55-61.

Frank Muller, Thijs Veugen, Robbert de Haan, Ronald Cramer “A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations”, IEEE transact. on info. Forensics, vol. 10, no. 3, March 2015.

Elumalaivasan et.al.,” CBIR- Retreival of Images using Median Vector Algorithm”, International Conference on Green Computing, Communication and Conservation of Energy, ICGCE 2013, Proceeding of IEEE XPlore, pp. 1–5, 2013, https://doi.org/10.1109/ICGCE.2013.6823389

Taha Junaid, et.al., “A comparative analysis of transformer-based models for figurative language classification”, Computers and Electrical Engineering, vol. 101, July 2022, https://doi.org/10.1016/j.compeleceng.2022.108051